Term
|
Definition
A set of rules applied by the owner/manager of a network, website or large computer system that restricts the ways in which the network site or system may be used. |
|
|
Term
|
Definition
Keys come in pairs. What one key encrypts, only the other can decrypt. |
|
|
Term
|
Definition
The steps that ensure that the individual is who they claim to be. |
|
|
Term
|
Definition
Security actions that ensure that data is accessible to authorized users. |
|
|
Term
|
Definition
A trust model with on CA that acts as a facilitator to interconnect to all other CAs. |
|
|
Term
|
Definition
A trusted third-party agency that is responsible for issuing digital certificates. |
|
|
Term
|
Definition
A process of documentation that shows that evidence was under strict control at all times and no unauthorized individuals were given the opportunity to corrupt the evidence. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A remote site that provides office space; the customer must provide and install all the equipment needed to continue operations. |
|
|
Term
|
Definition
Using Technology to search for computer evidence of a crime. |
|
|
Term
|
Definition
Security actions that ensure only authorized parties can view information. |
|
|
Term
|
Definition
The science of transforming information into a secure form while it is being transmitted or stored so that unauthorized persons cannot access it. |
|
|
Term
|
Definition
The process of changing ciphertext into plain text |
|
|
Term
|
Definition
A technology used to associate a user's identity to a public key, in which the user's public key is "digitally signed" by a trusted third party. |
|
|
Term
|
Definition
The procedures and processes for restoring an orginzation's IT operations following a disaster. |
|
|
Term
|
Definition
A trus model that has multiple CAs that sighn digital certificates. |
|
|
Term
|
Definition
The proportion of an asset's value that is likely to be destroyed by a particular risk (expressed as a percentage) |
|
|
Term
|
Definition
A metallic enclosure that prevents the entry or escape of a electromagnetic field. |
|
|
Term
|
Definition
THe process for creating a unique digital fingerprint signature for a set of data. |
|
|
Term
|
Definition
A trust model that has a single hierarchy with on master CA |
|
|
Term
|
Definition
A duplicate of the production site that has all the euipment needed for an organization to continue running, includeing office space and furniture, telephone jacks, computer equipment, and a live telecommunications link. |
|
|
Term
|
Definition
Security actions that ensure that the information is correct and no unauthorized person or malicious software have altered the data. |
|
|
Term
|
Definition
A set of protocols developed to support the secure exchange of packets |
|
|
Term
|
Definition
A highly trusted person responsible for recovering lost or damaged digital certificates. |
|
|
Term
|
Definition
The process of proving that a user performed an action |
|
|
Term
|
Definition
A test by an outsider to actually exploit any weaknesses in systes that are vulnerable. |
|
|
Term
|
Definition
A policy that outlines how the orginization uses personal information it collects. |
|
|
Term
|
Definition
An asymmetric encryption key that does have to be protected |
|
|
Term
|
Definition
An asymmetric encryption key that does not have to be protected |
|
|
Term
|
Definition
A framework for all of the entities involved in digital certificates for digital certificate managment. |
|
|
Term
|
Definition
A subordinate entity designed to handle specific CA tasks such as processing certificate requests and authenticating users. |
|
|
Term
|
Definition
The liklihood that a threat agent will exploit the vulnerability |
|
|
Term
|
Definition
A document or seris of documents that clearly defines the defense mechanisms an organization will employ to keep information secure. |
|
|
Term
|
Definition
A means of gathering information for an attach by relying on the weaknesses of individuals. |
|
|
Term
|
Definition
Grouping individuals and organizations into clusters or groups based on a like affilation. |
|
|
Term
|
Definition
Hiding the existence of data within a text, audio, image, or video file. |
|
|
Term
|
Definition
A trust model in which two individuals trust each other because each individually trusts a third party. |
|
|
Term
|
Definition
A type of action that has the potential to cause harm. |
|
|
Term
|
Definition
A chip on the motherboard of the computer that provides cryptographic services |
|
|
Term
|
Definition
Process of eavesdropping on the contents of a CRT or LCD display by detecting its electromagnetic emissions. |
|
|
Term
|
Definition
A remote site that contains computer equipment but does not have active internet or telecommunication facilities, and does not have backups of data. |
|
|